|
|
Network Attacks and Defenses: A Hands-on Approach
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both... | | Information Security Fundamentals, Second Edition
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides... | | Optimization in Medicine and Biology (Engineering and Management Innovation)
Thanks to recent advancements, optimization is now recognized as a crucial component in research and decision-making across a number of fields. Through optimization, scientists have made tremendous advances in cancer treatment planning, disease control, and drug development, as well as in sequencing DNA, and identifying protein... |
|
|
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a... | | A Guide to IT Contracting: Checklists, Tools, and Techniques
Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal... | | Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |